12 research outputs found

    An Interactive Distributed Simulation Framework With Application To Wireless Networks And Intrusion Detection

    Get PDF
    In this dissertation, we describe the portable, open-source distributed simulation framework (WINDS) targeting simulations of wireless network infrastructures that we have developed. We present the simulation framework which uses modular architecture and apply the framework to studies of mobility pattern effects, routing and intrusion detection mechanisms in simulations of large-scale wireless ad hoc, infrastructure, and totally mobile networks. The distributed simulations within the framework execute seamlessly and transparently to the user on a symmetric multiprocessor cluster computer or a network of computers with no modifications to the code or user objects. A visual graphical interface precisely depicts simulation object states and interactions throughout the simulation execution, giving the user full control over the simulation in real time. The network configuration is detected by the framework, and communication latency is taken into consideration when dynamically adjusting the simulation clock, allowing the simulation to run on a heterogeneous computing system. The simulation framework is easily extensible to multi-cluster systems and computing grids. An entire simulation system can be constructed in a short time, utilizing user-created and supplied simulation components, including mobile nodes, base stations, routing algorithms, traffic patterns and other objects. These objects are automatically compiled and loaded by the simulation system, and are available for dynamic simulation injection at runtime. Using our distributed simulation framework, we have studied modern intrusion detection systems (IDS) and assessed applicability of existing intrusion detection techniques to wireless networks. We have developed a mobile agent-based IDS targeting mobile wireless networks, and introduced load-balancing optimizations aimed at limited-resource systems to improve intrusion detection performance. Packet-based monitoring agents of our IDS employ a CASE-based reasoner engine that performs fast lookups of network packets in the existing SNORT-based intrusion rule-set. Experiments were performed using the intrusion data from MIT Lincoln Laboratories studies, and executed on a cluster computer utilizing our distributed simulation system

    Photogeneration and charge transport mechanisms in thin films of organic electron acceptor 2,4,7-trinitro-9-fluorenone

    No full text
    The photogeneration process in thin films of vacuum-evaporated amorphous 2,4,7-trinitro-9-fluorenone (a-TNF) is investigated by steady-state photoconductivity measurements and by the photoinduced discharge method. It was found that in the intrinsic spectral range of absorption (λ≤400 nm) the charge carrier photogeneration mechanism includes several steps. The final step, thermal dissociation of light generated electron-hole pairs, is realized according to the Onsager mechanism. The effect of trapping centers on the conductivity of thin films of a-TNF is investigated by space charge limited current (SCLC), steady-state photoconductivity, and transient photoconductivity methods. It is suggested that the transport of charge carriers in a-TNF is controlled by traps. © 2008 IOP Publishing Ltd

    Effective intrusion detection using multiple sensors in wireless ad hoc networks

    No full text
    In this paper we propose a distributed intrusion detection system for ad hoc wireless networks based on mobile agent technology. Wireless networks are particularly vulnerable to intrusion, as they operate in open medium, and use cooperative strategies for network communications. By efficiently merging audit data from multiple network sensors, we analyze the entire ad hoc wireless network for intrusions and try to inhibit intrusion attempts. In contrast to many intrusion detection systems designed for wired networks, we implement an efficient and bandwidth-conscious framework that targets intrusion at multiple levels and takes into account distributed nature of ad hoc wireless network management and decision policies

    Photogeneration and charge transport mechanisms in thin films of organic electron acceptor 2,4,7-trinitro-9-fluorenone

    No full text
    The photogeneration process in thin films of vacuum-evaporated amorphous 2,4,7-trinitro-9-fluorenone (a-TNF) is investigated by steady-state photoconductivity measurements and by the photoinduced discharge method. It was found that in the intrinsic spectral range of absorption (λ≤400 nm) the charge carrier photogeneration mechanism includes several steps. The final step, thermal dissociation of light generated electron-hole pairs, is realized according to the Onsager mechanism. The effect of trapping centers on the conductivity of thin films of a-TNF is investigated by space charge limited current (SCLC), steady-state photoconductivity, and transient photoconductivity methods. It is suggested that the transport of charge carriers in a-TNF is controlled by traps. © 2008 IOP Publishing Ltd

    Intrusion Detection Using Mobile Agents In Wireless Ad Hoc Networks

    No full text
    In this paper we propose a distributed intrusion detection system for ad hoc wireless networks based on mobile agent technology. Wireless networks are particularly vulnerable to intrusion, as they operate in open medium, and use cooperative strategies for network communications. By efficiently merging audit data from multiple network sensors, we analyze the entire ad hoc wireless network for intrusions and try to inhibit intrusion attempts. In contrast to many intrusion detection systems designed for wired networks, we implement an efficient and bandwidth-conscious framework that targets intrusion at multiple levels and takes into account the distributed nature of ad hoc wireless network management and decision policies

    Load Balancing Approach For The Ad Hoc Wireless Intrusion Detection Simulation Framework

    No full text
    Ad hoc wireless networks are widely utilized type of wireless networks today. More than any other network topology, they are vulnerable to intrusions, as they operate in an open medium and use cooperative strategies for network management and communications. In this paper we present a distributed intrusion detection simulation test-bed for ad hoc wireless networks based on mobile agent technology, and propose a load balancing algorithm that optimizes the allocation of intrusion detection tasks to various nodes within each wireless cluster, while maintaining high degree of intrusion detection accuracy. The load balancing policy enables intrusion detection system to efficiently allocate IDS tasks based on each wireless node\u27s available resources, minimizing overall resource usage in the system. In contrast to many intrusion detection systems designed for wired networks, we develop an efficient and bandwidth-conscious framework that targets intrusions at multiple levels and takes into account distributed nature of ad hoc wireless network management and decision policies

    Effective intrusion detection using multiple sensors in wireless ad hoc networks

    No full text
    In this paper we propose a distributed intrusion detection system for ad hoc wireless networks based on mobile agent technology. Wireless networks are particularly vulnerable to intrusion, as they operate in open medium, and use cooperative strategies for network communications. By efficiently merging audit data from multiple network sensors, we analyze the entire ad hoc wireless network for intrusions and try to inhibit intrusion attempts. In contrast to many intrusion detection systems designed for wired networks, we implement an efficient and bandwidth-conscious framework that targets intrusion at multiple levels and takes into account distributed nature of ad hoc wireless network management and decision policies

    Key Management with Improved Location Aided Cluster Based Routing Protocol in MANETs

    No full text

    Evaluating Performance Of Distributed Computing Technologies - Hla And Tspaces On A Cluster Computer

    No full text
    Parallel and distributed simulation is concerned with issues introduced by distributing the execution of a discrete event simulation program over multiple computers. For increased performance, a tightly-coupled parallel multiprocessor computing platform is used, containing multiple CPUs communicating over a highspeed interconnection network. Examples include parallel computers. While hardware specifications improve at exponential pace, the software technologies for parallelizing problems have remained relatively unchanged, posing problems due to rapidly increasing data volumes. Message passing has been the most widely used method to parallelize data mining algorithms. In this paper we investigate the performance of two widely used distributed computing technologies, High Level Architecture (HLA) and Tuple Spaces, used to solve the problem of an intrusion detection system utilizing parallel backpropagation neural network (BPNN) for a data mining process in a space-parallel approach. © ECMS, 2005
    corecore